Terrorism

G7 Summit – States demand Internet Giants to join forces against online propaganda

The nations participant at the G7 Summit in Taormina, Italy, demand action from internet service providers and social media giants against extremist content online.

The effort is necessary to fight against terrorism in a wake of the recent tragic Manchester attack.

“The G7 calls for Communication Service Providers and social media companies to substantially increase their efforts to address terrorist content,” the G7 states said in a statement.

“We encourage industry to act urgently in developing and sharing new technology and tools to improve the automatic detection of content promoting incitement to violence, and we commit to supporting industry efforts in this vein including the proposed industry-led forum for combating online extremism,” 

Investigators believe that the Manchester bomber may have been radicalized online by Islamic State groups active on social media.

“Make no mistake: the fight is moving from the battlefield to the internet,” Prime Minister Theresa May told her G7 colleagues while chairing a discussion on counter-terrorism in the Sicilian resort of Taormina.

Another common objective of the G7 is the identification and the prosecution of foreign fighters involved in various conflicts various areas, such as the Syria and the Turkey.

The G7 states are requesting the support from local authorities to prosecute the foreign fighters, Lebanon, Jordan and Iraq are areas of high interested in the investigators.

The investigators believe that the Manchester bomber had been to Syria after visiting his parents’ homeland of Libya.

“It is vital we do more to cooperate with our partners in the region to step up returns and prosecutions of foreign fighters,” added May.

“This means improving intelligence-sharing, evidence gathering and bolstering countries’ police and legal processes.”

(L-R): EU Council President Donald Tusk, Canadian Prime Minister Justin Trudeau, German Chancellor Angela Merkel, US President Donald Trump, Italian Prime Minister Paolo Gentiloni, French President Emmanuel Macron, Japanese Prime Minister Shinzo Abe, British Prime Minister Theresa May and European Union Commission President Jean-Claude Juncker pose for a family photo on the first day of the G7 Summit at the Teatro Greco in Taormina, Italy, 26 May 2017. The G7 Summit will be held from 26 to 27 May 2017. ANSA/ETTORE FERRARI ANSA/ETTORE FERRARI

The G7 states have to improve information sharing processes on terrorism issued, law enforcements and intelligence agencies share results of the investigations and border security methods with countries where foreign fighters travel through or fight in.

Every time a foreign fighter cross a border, specific actions must be triggered to track down them and their organizations.

“When our allies find evidence, such as video or papers, of illegal activity involving foreign fighters, for example a Brit in a conflict zone, they should pass that to our authorities. It may help prosecute foreign fighters when they return.”

[adrotate banner=”9″] [adrotate banner=”12″]

Pierluigi Paganini

(Security Affairs – G7 Summit Taormina, Foreign fighters)

[adrotate banner=”5″]

[adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

U.S. CISA adds Microsoft Internet Explorer and Twilio Authy bugs to its Known Exploited Vulnerabilities catalog

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Microsoft Internet Explorer and Twilio Authy bugs…

3 hours ago

China-linked APT group uses new Macma macOS backdoor version

China-linked APT group Daggerfly (aka Evasive Panda, Bronze Highland) Evasive Panda has been spotted using an…

14 hours ago

FrostyGoop ICS malware targets Ukraine

In April 2024, Dragos researchers spotted the malware FrostyGoop that interacts with Industrial Control Systems…

1 day ago

Hackers abused swap files in e-skimming attacks on Magento sites

Threat actors abused swap files in compromised Magento websites to hide credit card skimmer and…

1 day ago

US Gov sanctioned key members of the Cyber Army of Russia Reborn hacktivists group

The US government sanctioned two Russian hacktivists for their cyberattacks targeting critical infrastructure, including breaches…

2 days ago

EvilVideo, a Telegram Android zero-day allowed sending malicious APKs disguised as videos

EvilVideo is a zero-day in the Telegram App for Android that allowed attackers to send…

2 days ago

This website uses cookies.